The Enstep Blog
Get the latest technology insights and IT tips.
The IT Consulting Process: 4 Crucial IT Strategy Steps
Using an IT consulting approach to stay ahead of the competition is the key to IT success. You...
How to handle Suspicious E-mail
Phishing, pronounced “fishing,” is a type of online identity theft that uses e-mail and fraudulent Web sites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. Follow these guidelines to help protect yourself from phishing scams sent through e-mail. Read more
SaaS: An Overview
The growing reach and power of the internet has changed the way people do business, with more and more web-based services popping up. One of these is SaaS.
SaaS stands for Software as a Service, which refers to any licensed software being “rented” to a company by another company on an as-needed basis.
Understanding the Value of Managed Services
Most small and medium businesses can’t afford the luxury of a qualified IT administrator, let alone an entire IT department. If you’re in this position, how do you maintain the information technology infrastructure that’s critical to your organization? One option is Managed Services, in which you outsource this role to an IT expert called a “managed services provider,” which will typically offer on-site or remote network and security monitoring, data backup and technical support. Because the Managed Services model allow a business to focus on its core competencies, it is increasing in popularity—but sometimes it’s hard to separate the real benefit from the hype. What’s the value to you? Peace of mind. Your managed services provider will monitor your IT infrastructure and prevent or resolve any problems—a sharp diversion from the traditional “fix it when it breaks” model of IT management. Simplicity. Your managed services provider will provide many of its services remotely, via the Internet, instead of through on-site visits. This reduces time and cost. Constant support. You don’t have to worry about support; your managed services provider will offer the assistance you need, when you need it. Affordability. Managed services providers typically offer several price structures, including a per-month fee—which is much lower than the cost of building an in-house IT support department. Accountability. Have you ever tried to resolve an IT problem only to find that one vendor blames it on another who blames it on another? With managed services, you don’t have to go to multiple vendors to figure out why your network is down or you’ve experienced a security breach. You’ll have one point of contact: your managed services provider. Want to learn more about how Managed Services can give you dependable IT with predictable costs? Give us a call.
Hackers Target Email, Blogs, Social Networking Sites
In a report by security firm Websense , an alarming rise in the growth of malicious websites was identified in 2009 as compared to 2008 – almost 225 percent. The study also found an increased focus among hackers and spammers on targeting social media sites such as blogs and wikis. Social media or so-called Web 2.0 sites allow user-generated content , which can be a source of vulnerability. Researchers identified that up to 95 percent of user-generated comments to blogs, chat rooms, and message boards are spam or malicious – linking to data stealing sites or to downloads of malicious software . Email also continues to be a target for malicious activity with tens of thousands of Hotmail , Gmail and Yahoo! email accounts hacked and passwords stolen and posted online in 2009, which resulted in a marked increase in the number of spam emails. For our clients on our Managed Service plans, we work hard to ensure your systems are protected from harmful or malicious activity coming from the Internet. If you’re not under our Managed Service plans perhaps now is a good time to talk – let’s make sure your systems are safe in 2010. Related articles Top search results riddled with malware (v3.co.uk) Email phishing attack spreading say experts (telegraph.co.uk) Fraudsters Go Phishing For Victims’ Friends (news.sky.com)
Business Continuity Planning: Your Business May Depend on It
With the start of a new year, businesses commonly implement changes and launch new initiatives that have ramifications for your IT environment. Ignore them at your own peril. Chief among your IT considerations should be a Business Continuity Plan, or BCP, which will allow your business to resume normal operations in the event of a significant data loss or network downtime. Unfortunately, recent studies have found that about half of small and midsize businesses have no BCP. That’s a huge risk; more than half of companies that experience catastrophic data losses go out of business within a couple of years. And while it’s important to have a plan in the first place, it’s equally important that your BCP is flexible and scalable to adapt as your business undergoes changes. Software installations, modifications, and updates as well as the addition of new hardware are an important part of business continuity planning. You must ensure your backup, storage, and recovery procedures and systems are kept current with these changes. Improper maintenance and outdated procedures can lead to backup errors that result in costly data losses. Unfortunately, some companies discover these errors too late – when they try to recover the data. In addition to the IT considerations of a BCP, don’t ignore the human element. Someone, typically your IT staff, has to be in charge of overseeing BCP execution. But it doesn’t end there. Other employees have their roles, too, but do they know what those roles are? Have they been brought up to speed on the importance of backup and recovery, and what they need to do should you experience a catastrophic data loss? Has your business produced and printed a manual for employees to use as a reference? Let us help you assess your business continuity strategy to make sure it takes all relevant aspects into account and is kept current with your evolving needs. Your business may depend on it.
Is Your Business Ready for Tablet Computing?
Much has been said about the launch of Apple’s long awaited, new mobile device . Called the Apple iPad, the device promises to boost sales of a new category of computing devices called tablets. What are tablets? Tablets or tablet PCs are not new, and the concept itself has been around for 30 years. Although it’s had some success in industrial and commercial environments, it’s struggled to gain wide adoption among consumers in the past. Tablets, simply put, are slate-shaped, hand-held personal computers often with a touch screen or a stylus as input devices instead of a traditional keyboard. They are smaller and handier to carry around than Netbooks, but have larger, more capable screens than smartphones. With its launch, Apple has largely stolen the spotlight on tablet PCs – but is by no means the only vendor selling them. Other vendors include HP, Fujitsu, Samsung, Asus, and many more. Some use Windows, others Linux, while still others have their own proprietary operating systems. A special category of tablet PCs is ebook readers such as Amazon ’s Kindle and Barnes and Nobles ’s Nook. These are specialized tablets, primarily designed for viewing digital content. What are tablets good for? For consumers, the tablet’s appeal is that its form makes it easier to carry around and surf the Internet. Its larger screen allows users to view and interact with applications and media more comfortably than with a smartphone . What about business? Tablets seem to have hit their stride in niche applications within industry and commerce. For people in the field, it can be more convenient to carry around and better suited to outdoor conditions than a laptop, yet can be as powerful and capable. With the entry of Apple into the market, more generalized business applications could find its way to the devices, including: on-the-go presentation delivery quick information access on-the-go content creation and editing, such as photos, audio and video recording, and documents easy information sharing and collaboration Are Tablet PCs right for your business? If you’re considering using Tablet PCs in your business, here are some things to consider: Connectivity. How does the device connect to the Internet? Can it work within your existing office network? Can it securely access your data remotely (i.e., work with your existing VPN infrastructure)? Security. Does the device support the encryption of data? Can it authenticate against your existing applications? Portability. How much power does it consume? How long can it go between charges? Interoperability. Can you access your existing applications such as email? Can you use your existing network services? Can it open existing data and file formats such as your office documents and spreadsheets? Does it require significant investment to outfit and manage on an ongoing basis? Usability. Does it have enough power to run the applications you need? Is it easy to use or will it require extensive training? Even if you decide not to adopt the Tablet into your business environment, you may need to consider the impact that your employees may have using these devices on their own to do their work, as many began doing when Netbooks and Smartphones came out. If you would like to learn more about how Tablet PCs can affect your business and your IT services, contact us today. We will be glad to help.
Is Your Business Ready for Mobile?
Morgan Stanley has just released the Mobile Internet Report , which estimates that within five years, more users will access the Internet via mobile devices than desktop PCs. The growth in mobile Internet usage, according to Morgan Stanley’s analysts, is being driven by five technologies: 3G adoption – especially as more devices come out that support the wireless broadband standard at a lower price point than in previous years. Subscription costs for data access across the world have also been decreasing as service providers build out their infrastructure and achieve cost-efficiencies with scale. Social networking – which is driving a “constantly online” behavior among users engaged in communication, information sharing, and relationship building. Video – which has encouraged users to exchange rich, multimedia content online VoIP – which is lowering the cost of communication while improving the user experience by not tying them to their desks. Interesting new devices/initiatives – such as the launch of the iPhone , Palm Pre, and lately Google’s Android. What does this mean for SMEs? Well, for one thing this will require more vigilant monitoring, control, and oversight. Mobile devices can pose a significant security risk, since it’s getting difficult to track the data going in and out of these devices. Also, audit and control tools and procedures are simply not as mature as those available for desktop computers. The risks associated with theft and loss also increase since mobile devices’ small sizes make them easy to conceal or misplace. Is your organization ready for what’s coming? As mobile devices become the primary Internet access for consumers and workers, it’s time to for your organization to become aware of the issues surrounding their use.
Common Craft: Complicated Made Easy
For many people, learning begins by understanding the basic principles that drive a certain concept. Whether in technology or science or society, the world is filled with so many complex and complicated subjects that affect our lives, but remain largely misunderstood by the general public. This is where commoncraft.com comes in. Owned and maintained by husband and wife team Lee and Sachi LeFever from Seattle, Washington, the site’s goal is simple: to present complex concepts in a way that can be easily understood by anyone. Presented in videos they call “__________ in Plain English”, the LeFevers illustrate seemingly intimidating subject matter with terms that are easy to grasp – layman’s language, if you will – “in plain English”. Their first video, “RSS in Plain English”, quickly became an internet hit. Now they offer several free videos that use simple analogies to aid in comprehension accompanied by equally simple visual aids and illustrations. Topics include concepts about the environment, finance, society, and technology. The videos are completely free and do not require registration to view. Videos are kept short and sweet, cutting to the heart of the matter so that the broken down concepts are easily retained. You’ll hear no fancy words or technical jargon; everything is presented in an easy but no-nonsense manner. Common Craft can make a custom learning video for you for a fee, which you can discuss with them. Try giving their free videos a whirl and you’ll soon find out that some subjects aren’t as complicated as you might think.
Chinese Hackers Exploit IE Vulnerability in a Concerted Attack – Make Sure your Browser is Protected
Early January, Google released a report detailing attacks on its infrastructure which it claimed to have originated from China. In the wake of its announcement, another report came out detailing what is purported to be an “organized espionage operation” originating from China. Known as “Operation Aurora”, the attack attempted to siphon information from 33 companies in the US, including Google. The attackers are believed to have exploited a vulnerability in Internet Explorer (IE). The vulnerability affect IE 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and IE 6, IE 7, and IE 8 on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. In the wake of the attacks Microsoft released a patch to address the vulnerability. If you are unsure if this patch has been applied to your systems, contact us for help. Related links: More Security Flaws Found in Internet Explorer (Mashable)
Phishing Alert for QuickBooks Customers
IMPORTANT UPDATE FOR QuickBooks Customers: Intuit is receiving reports of individuals receiving fraudulent emails from QuickBooks or QuickBooks Online. The two separate emails ask customers to either download a plug in to assess their security or download a Digital Certificate. Customers should delete either of these emails. As we discover these fraudulent sites (cyber criminals often use the same email repeatedly, although they change web sites), we take them down. More at the Intuit website
Piracy Brings Malware According to Microsoft
Quoting research from various industry analysts, Microsoft warned that users who install unlicensed or counterfeit software on their PCs are 73% more likely to suffer data loss or damage than users of legitimate software. The company also cited a 2006 IDC study that found that 25% of counterfeit software attempted to install unwanted or malicious code when downloaded.
New Study Reveals Extent of Losses Due to Phishing Attacks
Trusteer, a security solutions vendor, recently released the results of their study which shows how successful phishing attacks are, how many users respond to phishing attacks, and how many users submit their login information to criminal websites. The results are alarming.
Occasional Update
Hello friends, this is Brett Passmore.
For some, it has been a long time since we talked, and I apologize for that. I truly hope you are doing well. I will do my best to be in touch on a more consistent basis.
Our family had quite the holiday break. If you ever want to get to know your family and yourself, take
an RV trip. We just travelled to Ohio ……
Reach out with MS Publisher greeting cards
When you want to thank loyal customers and reconnect with friends, greeting cards offer a great way to reinforce the personal link between you and them. Using Microsoft Office Publisher 2007, you can quickly produce exactly the greeting card that you want. Learn how…
Set or remove reminders in MS Outlook
Typically, reminders are associated with tasks and deadlines. However, reminders are versatile and can be used with calendar items, e-mail messages, and contacts as well as tasks. Learn how…
Where do you go
from here?
Reach out and find out how great Enstep support can be!












